First published: Wed Oct 02 2024(Updated: )
A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information. This vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard Fabric Controller | <12.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20448 has a severity rating that indicates it poses a risk due to the exposure of sensitive information.
To mitigate CVE-2024-20448, upgrade to the latest version of Cisco Nexus Dashboard Fabric Controller that addresses this vulnerability.
CVE-2024-20448 is caused by improper storage of sensitive information in backup files.
Organizations using Cisco Nexus Dashboard Fabric Controller versions below 12.2.2 are affected by CVE-2024-20448.
CVE-2024-20448 requires an attacker to have access to the backup files, limiting the exploit to localized scenarios.